Want to keep learning?

This content is taken from the Coventry University's online course, The Cyber Security Landscape. Join the course to learn more.


Most organisations and businesses today rely on IT systems for storing company and client information. They invest heavily in secure IT infrastructure to protect these data assets.

Transfer data between computer and laptop. Backup data and computer network. - stock vector

While there are risks, it is important to understand that, if managed effectively, cyber security is not just about managing the risk to computer networks from hackers or from equipment failure. Risks extend far beyond this and some of the examples include:

  • Loss of disks with vital data
  • Unauthorised access to systems
  • Weak passwords leading to easy access
  • Children using company laptops/devices leading to vulnerabilities

Digital technology and breaches in the security that stores the data can also put employees at personal risk. Consider these below:

  • Employees at risk of being mugged or attacked because they are carrying expensive digital equipment in public
  • Increased risk of identity theft by asking employees to post certain information online, such as their birthday, place of work, education or work background
  • Risk of being accidentally exposed to inappropriate material (pornography, violence) for instance, by clicking on a fraudulent email link
  • Employees are stressed as they are asked to deal with public messages during an online social media crisis
  • Unpleasant colleagues bullying other employees on social media
  • Risk of employees exposed to blackmail as they may have access to valuable data on digital systems

Share this article:

This article is from the free online course:

The Cyber Security Landscape

Coventry University